News
1/9/2013
00:00 AM
Bill Kleyman
Bill Kleyman
Commentary
Connect Directly
Facebook
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

When Cloud Computing Is The Wrong Fit

ROI is the first question to answer when deciding if cloud computing is a good platform for your enterprise. Three others involve compliance, infrastructure, and a strong business case.

I’m a big fan of cloud computing and always enjoy seeing it done right. This means good planning, a solid infrastructure, and a use-case that directly fits what the cloud can deliver.

Today, almost every organization that uses the Internet is utilizing some element of cloud computing. The differentiator is the cloud model and the extent to which that model is deployed. In my experience there are instances where a particular cloud platform is a great fit. On the other hand, some companies absolutely do not need this type of solution.

One of the most important first steps to take when you are deciding whether or not to adopt a cloud platform is to establish a solid use-case that can generate ROI. From there, you should look at the investment your company will need to make. In some cases, migrating to the cloud just won’t make sense. Here are three examples.

1. Compliance and regulations
Unless you are planning a very secure private cloud solution, many cloud computing platforms will leverage some element of a public Internet infrastructure. This might mean sharing bandwidth or utilizing a datacenter to host your solution.

Think twice about the cloud if you’re in an industry heavily monitored by compliance rules and regulations. Only a handful of enterprise datacenters are able to manage PCI compliance for organizations that use them as hosts. Also, PCI compliance may come at a high cost. Remember to always take regulations into account prior to committing to a cloud provider.

2. Infrastructure
In some cases, the business plan is there, but the environment is not. A good cloud solution often means using pieces from storage, LAN/WAN, servers, virtualization, user control, and putting them all together. If some part isn’t there or something isn’t ready to handle this type of new load, there’s a good chance you’ll experience some performance degradation.

This situation is where analyzing ROI and the actual business investment is critical. Be sure to ask key questions like how much additional hardware will you need to buy and whether it actually makes sense to host infrastructure off site. What’s more, having infrastructure doesn’t only limit you to hardware. You also have to have the right people to support your cloud environment. This means employing engineers who are cloud-ready and managers who understand the vision of their cloud model.

3. Poor business-case
Developing a strong business case means identifying a set of challenges and finding a way to overcome problems with an intelligent piece of technology. Unfortunately, unexpected events can slow down the cloud migration process and cost companies a lot of money.

To avoid a cloud budget-buster, it’s important to develop a business-case that utilizes technology that will perform for current and future needs. That means that datacenter managers and architects have to consider how their business will evolve and be flexible and forward-thinking in developing a cloud strategy. For example, if administrators provision hardware that can’t support users after a year or so, it’s quite possible that the initial planning was flawed, and the results will be disastrous.

Like any technology, cloud computing starts with a well-conceived plan and an infrastructure that will endure. Processes like testing, maintenance, business continuity, and even personnel training are all very important to weigh when considering the pluses and minuses of migrating to the cloud. With the right model in place and a good infrastructure, the cloud can be a powerful platform to leverage. However, with the wrong mindset and a poorly planned deployment, a cloud model can quickly become a cash-drain.

This article originally appeared in The Transformed Datacenter on 1/9/2013.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0485
Published: 2014-09-02
S3QL 1.18.1 and earlier uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object in (1) common.py or (2) local.py in backends/.

CVE-2014-3861
Published: 2014-09-02
Cross-site scripting (XSS) vulnerability in CDA.xsl in HL7 C-CDA 1.1 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted reference element within a nonXMLBody element.

CVE-2014-3862
Published: 2014-09-02
CDA.xsl in HL7 C-CDA 1.1 and earlier allows remote attackers to discover potentially sensitive URLs via a crafted reference element that triggers creation of an IMG element with an arbitrary URL in its SRC attribute, leading to information disclosure in a Referer log.

CVE-2014-5076
Published: 2014-09-02
The La Banque Postale application before 3.2.6 for Android does not prevent the launching of an activity by a component of another application, which allows attackers to obtain sensitive cached banking information via crafted intents, as demonstrated by the drozer framework.

CVE-2014-5136
Published: 2014-09-02
Cross-site scripting (XSS) vulnerability in Innovative Interfaces Sierra Library Services Platform 1.2_3 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.